Which of the following is a portable, personal computer designed to fit on your lap?
A. handtop
B. desktop
C. PDA
D. notebook
Answer: D
You might also like to view...
The enumeration FileAccess is used to ________.
a) control future users’ access to a file a) control future users’ access to a file b) control program access to a file c) control the amount of updating that can be done on a file at once d) FileAccess is a method, not an enumeration. c) control the amount of updating that can be done on a file at once d) FileAccess is a method, not an enumeration.
____________________ are machines that have been unobtrusively "owned" by a hacker.?
Fill in the blank(s) with the appropriate word(s).
The nine points inside the Transform Each dialog box are ____________________ points.
Fill in the blank(s) with the appropriate word(s).
A new document created from a mail merge, contains data from the data source but does not contain any ________
Fill in the blank(s) with correct word